Analysis
-
max time kernel
160s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:52
Static task
static1
Behavioral task
behavioral1
Sample
5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe
Resource
win10v2004-20220812-en
General
-
Target
5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe
-
Size
1.3MB
-
MD5
620d625c4086fea86b66e67df6ce600f
-
SHA1
cc67528767cad765b103dd36d716ef7a6046e6bc
-
SHA256
5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead
-
SHA512
85cbcfec83d69cbd9df63ad980a651fa075731f7a892b5ee2adde2b3169b2bb629c73c4287e6f1ee8944f77cd3757fe5cab5a52675701050a70fa47fdaec0f68
-
SSDEEP
24576:brKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakm:brKo4ZwCOnYjVmJPal
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exedescription pid process target process PID 4948 set thread context of 4576 4948 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exepid process 4576 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 4576 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 4576 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 4576 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 4576 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exedescription pid process target process PID 4948 wrote to memory of 4576 4948 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe PID 4948 wrote to memory of 4576 4948 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe PID 4948 wrote to memory of 4576 4948 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe PID 4948 wrote to memory of 4576 4948 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe PID 4948 wrote to memory of 4576 4948 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe PID 4948 wrote to memory of 4576 4948 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe PID 4948 wrote to memory of 4576 4948 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe PID 4948 wrote to memory of 4576 4948 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe PID 4948 wrote to memory of 4576 4948 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe PID 4948 wrote to memory of 4576 4948 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe 5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe"C:\Users\Admin\AppData\Local\Temp\5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\5c9444a2d9e799b54e22693860edcb448b6350e7240c64cc5931aa5dfde2bead.exe
- Suspicious use of SetWindowsHookEx
PID:4576